Secure and Trusted Application Execution on Embedded Devices

Konstantinos Markantonakis, Raja Akram, Mehari Msgna

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Embedded devices have permeated into our daily lives and significant day-to-day mundane tasks involve a number of embedded systems. These include smart cards, sensors in vehicles and industrial automation systems. Satisfying the requirements for trusted, reliable and secure embedded devices is more vital than ever before. This urgency is also strengthened further by the potential advent of the Internet of Things and Cyber-Physical Systems. As our reliance on these devices is increasing, the significance of potential threats should not be underestimated, especially as a number of embedded devices are built to operate in malicious environments, where they might be in the possession of an attacker. The challenge to build secure and trusted embedded devices is paramount. In this paper, we examine the security threats to embedded devices along with the associated prevention mechanisms. We also present a holistic approach to the security and trust of embedded devices, from the hardware design, reliability and trust of the runtime environment to the integrity and trustworthiness of the executing applications. The proposed protection mechanisms provide a high degree of security at a minimal computational cost. Such an agnostic view on the security and trust of the embedded devices can be pivotal in their adoption and trust acquisition from the general public and service providers.
Original languageEnglish
Title of host publicationInnovative Security Solutions for Information Technology and Communications (SECITC 2015)
EditorsI Bica, D Naccache , E Simion
PublisherSpringer
Pages3-24
Number of pages22
ISBN (Electronic)978-3-319-27179-8
ISBN (Print)978-3-319-27178-1
DOIs
Publication statusPublished - 15 Jan 2016

Keywords

  • Smart Cards
  • Fault Attacks
  • Runtime Attacks
  • Hardware Security
  • Runtime Security
  • Trusted Platform
  • Trusted Execution
  • Hardware Trojans
  • Counterfeit Products

Fingerprint Dive into the research topics of 'Secure and Trusted Application Execution on Embedded Devices'. Together they form a unique fingerprint.

  • Cite this

    Markantonakis, K., Akram, R., & Msgna, M. (2016). Secure and Trusted Application Execution on Embedded Devices. In I. Bica, D. Naccache , & E. Simion (Eds.), Innovative Security Solutions for Information Technology and Communications (SECITC 2015) (pp. 3-24). Springer . https://doi.org/10.1007/978-3-319-27179-8_1